VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-200609-1157 No CVE CVSS V2: -
CVSS V3: -
Severity: -
VAR-200110-0295 No CVE CVSS V2: -
CVSS V3: -
Severity: -
VAR-200110-0304 No CVE CVSS V2: -
CVSS V3: -
Severity: -
VAR-200609-1288 No CVE CVSS V2: -
CVSS V3: -
Severity: -
VAR-200110-0334 No CVE CVSS V2: -
CVSS V3: -
Severity: -
VAR-200609-1358 No CVE CVSS V2: -
CVSS V3: -
Severity: -
VAR-200110-0351 No CVE CVSS V2: -
CVSS V3: -
Severity: -
VAR-200110-0354 No CVE CVSS V2: -
CVSS V3: -
Severity: -
VAR-200110-0362 No CVE CVSS V2: -
CVSS V3: -
Severity: -
VAR-199809-0010 CVE-1999-0897 apple's  iChat Server  Vulnerability in CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
iChat ROOMS Webserver allows remote attackers to read arbitrary files via a .. (dot dot) attack. apple's iChat Server Exists in unspecified vulnerabilities.None. Attackers can exploit this issue to perform unauthorized actions. This may aid in further attacks
VAR-199809-0014 CVE-1999-0162 Cisco IOS Security hole CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The "established" keyword in some Cisco IOS software allowed an attacker to bypass filtering
VAR-199809-0009 CVE-1999-0792 ROUTERmate Configuration modification vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
ROUTERmate has a default SNMP community name which allows remote attackers to modify its configuration
VAR-199808-0007 CVE-1999-0158 Cisco Systems  Cisco Pix Firewall  Software vulnerabilities CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Cisco PIX firewall manager (PFM) on Windows NT allows attackers to connect to port 8080 on the PFM server and retrieve any file whose name and location is known. Cisco Systems Cisco Pix Firewall There are unspecified vulnerabilities in the software.None. PFM itself implements a Web Server with limited functions. PFM Web Server runs on Windows NT. There is a security hole in the URL request processing of PFM Web Server. A remote attacker may use this hole to read any file with a known file name on the system. The attacker must be able to establish a connection to the 8080/TCP port of the Windows NT host. In all recommended configurations and most actual configurations, the 8080/TCP port of the host where the PFM is located is only allowed to be accessed from the inside of the PIX firewall, not from the PIX Access from outside the firewall. Additionally, the attacker must know the exact path of the target file, and the vulnerability does not allow directory browsing
VAR-199808-0006 CVE-1999-0157 Cisco Systems  Cisco IOS  and  Cisco Pix Firewall  Software vulnerabilities CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Cisco PIX firewall and CBAC IP fragmentation attack results in a denial of service. Cisco Systems Cisco IOS and Cisco Pix Firewall There are unspecified vulnerabilities in the software.None
VAR-199808-0020 No CVE Cisco PIX and CBAC Fragmentation Attack CVSS V2: -
CVSS V3: -
Severity: -
Both the Cisco PIX Firewall software as the Context-based Access Control (CBAC) feature of Cisco's IOS Firewall Feature Set do not properly check non-initial fragmented IP packets. Although the non-initial fragmented IP packets might belong to session which would normally be blocked, they are forwarded to the destination host. This may lead to a denial of services (DOS) attack due to the exhaustion of resources required to keep track of the fragmented IP packets. The problem can be fixed by keeping track of the sessions that fragmented IP packets belong to and by blocking non-initial fragmented IP packets for which no initial packet has been seen. The DOS attack can easily be carried out by publically available tools.
VAR-199808-0008 CVE-1999-0159 Cisco Systems  Cisco IOS  Vulnerability in CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Attackers can crash a Cisco IOS router or device, provided they can get to an interactive prompt (such as a login). This applies to some IOS 9.x, 10.x, and 11.x releases. Cisco Systems Cisco IOS Exists in unspecified vulnerabilities.None
VAR-199808-0022 No CVE Cisco IOS Remote Router Crash CVSS V2: -
CVSS V3: -
Severity: -
Cisco IOS software is reported prone to a remote denial of service vulnerability. This may allow an attacker to cause a vulnerable device to crash or hang. It is reported that this issue may cause damage to an internal data structure, which could lead to other problems as well. An attacker does not require authentication credentials to exploit this issue, as only access to the login prompt of a device is sufficient to trigger this issue.
VAR-199807-0030 CVE-1999-1582 PIX 'established' and 'conduit' command may have unexpected interactions CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
By design, the "established" command on the Cisco PIX firewall allows connections from one host to arbitrary ports of a target host if an alternative conduit has already been allowed, which can cause administrators to configure less restrictive access controls than intended if they do not understand this functionality. A somewhat common configuration of Cisco PIX firewalls may permit a window of opportunity in which an intruder can bypass the firewall. This problem was first publicly described in July, 1998. Cisco Systems Cisco PIX Firewall Software Exists in unspecified vulnerabilities.None. PIX Firewall is prone to a remote security vulnerability
VAR-199807-0005 CVE-1999-1436 World Wide Web Authorization Gateway Vulnerability CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
Ray Chan WWW Authorization Gateway 0.1 CGI program allows remote attackers to execute arbitrary commands via shell metacharacters in the "user" parameter. Version 1.0 fails to eliminate characters with special meaning to the shell prior to executing a command. As a result, an attacker can utilize certain characters to execute arbitrary commands on a system remotely, as whatever user invoked the cgi-bin
VAR-199805-0007 CVE-1999-1204 Check Point Firewall Vulnerability CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
Check Point Firewall-1 does not properly handle certain restricted keywords (e.g., Mail, auth, time) in user-defined objects, which could produce a rule with a default "ANY" address and result in access to more systems than intended by the administrator. Firewall-1 is prone to a remote security vulnerability. Attackers can exploit this issue to perform unauthorized actions. This may aid in further attacks